blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

Stay Alert to Compromised Credentials with Dark Web Monitoring

CoreTech Staff
Do you know if your CEO’s email username and password are being sold on the dark web right now? How would you? Eventually, you’ll find out when you have to prevent finance from wiring a hacker - posing as your CEO - large sums of money. Or, you may find out after finance has already fallen for a CEO fraud phishing scam and wired a hacker money… But if there is a way for you to know when your CEO’s credentials are being sold in the first place, you can stop the scam before it even starts. Well, ...
Read More
Topics: Security Threats, Data Breach, Network Security

How Does Artificial Intelligence Impact SMB Cyber Security?

CoreTech Staff
To simplify and automate some processes, many fields of business, like marketing and customer service, are taking advantage of artificial intelligence (AI) and machine learning to make their daily work processes easier and smoother.   But there’s another crucial industry that’s heavily impacted by artificial intelligence: cyber security.   With the array of IT security solutions that utilize AI becoming more readily available, you can expect small and medium-sized businesses to have access to ...
Read More
Topics: Security Threats, Network Security

SolarWinds Breach Underscores Need for Vigilant SMB Cyber Security Practices

CoreTech Staff
Many cyber security frontrunners and government agencies are calling the SolarWinds breach one of the most sophisticated attacks they have ever witnessed. Its global reach, to organizations of all sizes, stresses the importance of an optimized, layered cyber security strategy.   In today’s post, I’m going to detail what happened in the SolarWinds breach, why it matters and how you can keep your SMB safe from cyber security attacks with the right solutions. 
Read More
Topics: Security Threats, Data Breach, Network Security

Cyber Security Threats to Watch Out for in 2021

CoreTech Staff
2020 proved to be a difficult year for many businesses, particularly with regard to IT and cyber security. From managing remote working solutions to ensuring that IT systems were flexible to meet the ongoing uncertainty of the COVID-19 pandemic, business owners have had to make many unforeseen changes. And as the fraught year of 2020 drew to a close, a sophisticated cyberattack on third-party software from Solarwinds, used by companies large and small across the U.S., resulted in numerous ...
Read More
Topics: Security Threats, Network Security

Do I Need a Firewall When Employees Work Remotely?

Joel Havenridge
With more small businesses turning to a remote workforce, protecting business operations and data is crucial. As a business owner, you most likely will need multiple firewalls to provide the necessary security required by remote access. This includes both an on-premise appliance and software that runs on the remote computers your employees use at home.  Evaluating the use and risk of your IT solutions will go a long way in deciding which firewalls you need so you can get the most benefits of ...
Read More
Topics: Equipment Purchases, Network Security

Is Microsoft Teams HIPAA Compliant?

CoreTech Staff
Like many other businesses, healthcare organizations continue to search for ways to work with employees and customers through enhanced mobility and collaboration. While working through the cloud provides greater reach and access, connecting online puts these businesses at greater risk for exposure, data leaks and targeted attacks from cyber criminals, particularly if employees are using their own personal devices. And healthcare organizations must remain HIPAA compliant throughout this sharing ...
Read More
Topics: Microsoft Products, Network Security, Health Care

Why Your SMB Should Care about Ransomware

CoreTech Staff
2020 has been an unexpected, topsy-turvy year for everyone running a business. From moving to remote models to digital marketing, a lot of businesses are conducting a majority of their business online.   With that digital shift comes more pronounced vulnerabilities to cyber attacks, and one of the most noteworthy tactics criminals have turned to is ransomware. In fact, it is now the most common type of cyber security incident threatening small-midsized businesses.   Read on to learn more about ...
Read More
Topics: Security Threats, Network Security

Your Business's Devices and IT Systems: Are You Taking the Right Precautions?

Wynn Obermeyer
Managing information systems and security is a top priority for every business owner in order to protect both business operations and client data. But knowing if you have the right cyber security solutions in place to provide this protection may not be readily apparent, particularly if you do not have an IT expert on your team. 
Read More
Topics: Security Threats, Network Security

Why You Need a Security Risk Assessment

Wynn Obermeyer
Cyber security remains a top concern for all businesses, big and small. After all, cyber criminals work 24/7 to steal your business data. As such, it’s imperative to routinely evaluate your cyber security to make sure it’s up to the task of warding off attacks. And while protecting your data is the ultimate goal, conducting an IT security risk assessment offers many other benefits as well. 
Read More
Topics: Security Threats, Network Security

Why Does Your Organization Need Mobile Device Management?

Jason Hahn
The current popularity of remote and flexible work options marks an evolution in normal workplace practices. But, while your employees may enjoy their newfound freedom of working from mobile devices within their home office or local coffee shop, you as a business owner or manager may have some security concerns about monitoring and managing all those mobile devices. That’s where Mobile Device Management (MDM) comes into the equation.
Read More
Topics: Security Threats, Network Security, Technology Planning